Password

  • Thread starter Thread starter Ed Duarte
  • Start date Start date
You don't change your password at start-up but you do change it when you
are logged in and using User Account in control panel.

Log on to your system, Go to Start, Control Panel, User Accounts, User
Account Panel [again], now select change password.

hth
 
You provide so little information....

But, a word of warning -

If you are running XP Professional, and have and use ENCRYPTION on any files (when
they show-up as "green" in Explorer) - changing your password makes all your
encrypted files INACCESSIBLE with not much chance of recovery....

==

Cheers, Tim Meddick, Peckham, London. :-)
 
In Tim Meddick typed on Sat, 8 Aug 2009 23:45:20 +0100:
You provide so little information....

But, a word of warning -

If you are running XP Professional, and have and use ENCRYPTION on
any files (when they show-up as "green" in Explorer) - changing your
password makes all your encrypted files INACCESSIBLE with not much
chance of recovery....

Is this true of those update uninstall folders in the Windows folder
too? Those are just compressed, not encrypted right?
 
Bill,
You are absolutely right - compressed - not encrypted.

In point of fact - Window's will not permit the encryption of files in the Windows
directory, or files that it classes as Operating System files...

==

Cheers, Tim Meddick, Peckham, London. :-)
 
Ed said:
How do I change my password at startup?

Tim said:
You provide so little information....

But, a word of warning -

If you are running XP Professional, and have and use ENCRYPTION on
any files (when they show-up as "green" in Explorer) - changing
your password makes all your encrypted files INACCESSIBLE with not
much chance of recovery....
Is this true of those update uninstall folders in the Windows folder
too? Those are just compressed, not encrypted right?

Default colors:

Blue: Compressed.
Green: Encrypted.

Not everyone's $NT folders/containing files are compressed. Unless they do
it themselves (or someone with that right does it on the computer) - they
are not encrypted.

You can change your password yourself (logged in as the user and doing it
properly for your own account) and not mess up your access to your encrypted
files. However - if you the password is changed by another system
administrator or hacked some other way - without the proper backups of the
certificates and private keys, yes - all is basically lost. :-/

Best practices for the Encrypting File System
http://support.microsoft.com/kb/223316

And for the OP, again, but with just as much assumption involved as anything
else...

http://www.microsoft.com/resources/...l/proddocs/en-us/windows_password_change.mspx
http://pcsupport.about.com/od/tipstricks/ht/chgpassxp.htm
 
Shenan,
changing the current user's password from within their own profile will
not prevent the encryption keys from being changed and thereby loose access to any
encrypted files that user has.

The way your post read gave the impression that's all they had to do to preserve
access to their encrypted files.

I had the unfortunate experience of finding out the hard way, I changed my password
(I was an administrator-level account) from within the 'User Accounts' control panel
and subsequently all my encrypted files were "Access Denied"....

==

Cheers, Tim Meddick, Peckham, London. :-)
 
Ed said:
How do I change my password at startup?

Tim said:
You provide so little information....

But, a word of warning -

If you are running XP Professional, and have and use ENCRYPTION on
any files (when they show-up as "green" in Explorer) - changing
your password makes all your encrypted files INACCESSIBLE with not
much chance of recovery....
Is this true of those update uninstall folders in the Windows folder
too? Those are just compressed, not encrypted right?

Shenan said:
Default colors:

Blue: Compressed.
Green: Encrypted.

Not everyone's $NT folders/containing files are compressed. Unless
they do it themselves (or someone with that right does it on the
computer) - they are not encrypted.

You can change your password yourself (logged in as the user and
doing it properly for your own account) and not mess up your access
to your encrypted files. However - if you the password is changed
by another system administrator or hacked some other way - without
the proper backups of the certificates and private keys, yes - all
is basically lost. :-/
Best practices for the Encrypting File System
http://support.microsoft.com/kb/223316

And for the OP, again, but with just as much assumption involved as
anything else...

http://www.microsoft.com/resources/...l/proddocs/en-us/windows_password_change.mspx
http://pcsupport.about.com/od/tipstricks/ht/chgpassxp.htm

Tim said:
Shenan,
changing the current user's password from within their
own profile will not prevent the encryption keys from being changed
and thereby loose access to any encrypted files that user has.

The way your post read gave the impression that's all they had to
do to preserve access to their encrypted files.

I had the unfortunate experience of finding out the hard way, I
changed my password (I was an administrator-level account) from
within the 'User Accounts' control panel and subsequently all my
encrypted files were "Access Denied"....

The Encrypting File System
http://technet.microsoft.com/en-us/library/cc700811.aspx
"For Windows XP and Windows Server 2003 local accounts, a password reset
disk can be used to safely reset a user's password. (Domain passwords cannot
be reset using the disk.) If an administrator uses the "reset password"
option from the user's account in the Computer Management console users
container, EFS files won't be accessible. If users change the password back
to the previous password, they can regain access to encrypted files."

I haven't worked with EFS in a while, so you may be correct - but I recall
that if a user logs in as themself and then changes their own password
(workgroup environment, not domain - that complicates things) they will not
lose asccess to their own encrypted files. Although, again, I should point
out they would be unwise if the do not follow the Best Practices I linked to
previously.

EFS, Credentials, and Private Keys from Certificates Are Unavailable After a
Password Is Reset
http://support.microsoft.com/kb/290260

*Note: "This issue can occur if the password was forcefully reset by an
administrator or owner, instead of being changed by the user."

So are you saying you changed your password using these steps (not in a
domain):
http://www.microsoft.com/resources/...l/proddocs/en-us/windows_password_change.mspx
and you lost access to your encrypted files?

Or are you saying you reset another user's account (another user on the
computer) password and that user account subsequently lost access to their
encrypted files (as would be expected and pointed out in many documents -
including the message you get when resetting a users password in that
manner0?
 
Mine was the only user account on the system - administrator-level.

I changed my own password in "User Accounts" (incidentally, I changed the password
but entered the same password to change it to - I don't know what I was thinking. So
the option to regain access by resetting the password back to the original would not
have worked!).

On subsequent reboot, I got "Access Denied".

BTW - I had backed up my encryption keys but, after doing loads of online research -
couldn't work what to do with it, so gave up on the lost data.

What I couldn't work out was if I could regain access to my files using just the
backed-up keys, but got the impression from what I read, that I needed to have made
myself the "Recovery Agent" beforehand (???)

==

Cheers, Tim Meddick, Peckham, London. :-)
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads


Back
Top